Uploaded image for project: 'OpenVZ'
  1. OpenVZ
  2. OVZ-6915

vz7: Kernel Crash "kernel BUG at net/core/skbuff.c:153 - invalid opcode: 0000 [#1] SMP"

    XMLWordPrintable

    Details

      Description

      We are experiencing a kernel panic, this has happened several times. We also have Virtuozzo 7 and experienced a similar issue that was just resolved by their developers with a kpatch. Can this be resolved for OpenVZ 6 as well?

      <0>[174460.409916] skb_under_panic: text:ffffffffa02cc57e len:290 put:14 head:ffff883981bc9c00 data:ffff883981bc9bf2 tail:0x114 end:0x140 dev:tap_softether
      <4>[174460.409971] ------------[ cut here ]------------
      <2>[174460.409982] kernel BUG at net/core/skbuff.c:153!
      <4>[174460.409995] invalid opcode: 0000 [#1] SMP
      <4>[174460.410017] last sysfs file: /sys/devices/virtual/net/venet0/uevent
      <4>[174460.410031] CPU 16
      <4>[174460.410040] Modules linked in: xt_time fuse xt_connmark xt_CONNMARK ppp_generic slhc xt_MARK xt_mark xt_recent ip6t_LOG ip6t_rt xt_comment ipt_addrtype ipt_MASQUERADE xt_conntrack tun vzethdev pio_kaio pio_nfs pio_direct pfmt_raw pfmt_ploop1 ploop simfs vzrst vzcpt nfs lockd fscache auth_rpcgss nfs_acl sunrpc vziolimit vzdquota vzevent kcare(U) vznetdev vzmon vzdev ipt_REDIRECT xt_owner nf_nat_ftp nf_conntrack_ftp iptable_nat nf_nat xt_length xt_hl xt_tcpmss xt_TCPMSS xt_multiport xt_limit nf_conntrack_ipv4 nf_defrag_ipv4 ipt_LOG xt_DSCP xt_dscp ipt_REJECT iptable_filter iptable_mangle iptable_raw ip_tables ip6t_REJECT nf_conntrack_ipv6 nf_defrag_ipv6 xt_state nf_conntrack ip6table_filter ip6table_mangle ip6_tables ipv6 iTCO_wdt iTCO_vendor_support power_meter acpi_ipmi ipmi_si ipmi_msghandler sg sb_edac edac_core ixgbe mdio igb dca i2c_algo_bit ptp pps_core i2c_i801 i2c_core lpc_ich mfd_core joydev shpchp ext4 jbd2 mbcache sd_mod crc_t10dif megaraid_sas xhci_hcd ahci wmi dm_mirror dm_region_hash dm_log dm_mod [last unloaded: scsi_wait_scan]
      <4>[174460.411016]
      <4>[174460.411171] Pid: 968764, comm: tb_userspace veid: 3587 Not tainted 2.6.32-042stab123.3 #1 042stab123_3 Supermicro SYS-1028R-WC1R/X10DRW-i
      <4>[174460.411506] RIP: 0010:[<ffffffff8147d56d>] [<ffffffff8147d56d>] skb_under_panic+0x5d/0x70
      <4>[174460.411827] RSP: 0018:ffff8801b1a03a18 EFLAGS: 00010296
      <4>[174460.411989] RAX: 000000000000009f RBX: ffff88403e47d440 RCX: 0000000000007f94
      <4>[174460.412303] RDX: 0000000000000000 RSI: 0000000000000046 RDI: 0000000000000246
      <4>[174460.412619] RBP: ffff8801b1a03a38 R08: 0000000000000000 R09: ffffffff816493e0
      <4>[174460.412935] R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000002
      <4>[174460.413248] R13: ffff88403dcf5980 R14: 000000000000000e R15: ffff88403dcf59d8
      <4>[174460.413562] FS: 00007f806b011700(0000) GS:ffff8801b1a00000(0000) knlGS:0000000000000000
      <4>[174460.413878] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
      <4>[174460.414041] CR2: 00007f5468e9b650 CR3: 0000003fde834000 CR4: 00000000001407e0
      <4>[174460.414356] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
      <4>[174460.414987] Process tb_userspace (pid: 968764, veid: 3587, threadinfo ffff88403aa50000, task ffff88402d68c640)
      <4>[174460.415312] Stack:
      <4>[174460.415467] 0000000000000114 0000000000000140 ffff8879159aa020 ffff884063004d40
      <4>[174460.415642] <d> ffff8801b1a03a58 ffffffff8147e3e0 000000000000000e ffff88403e47d440
      <4>[174460.415974] <d> ffff8801b1a03ab8 ffffffffa02cc57e 0000000000000028 ffff8839c2542028
      <4>[174460.416457] Call Trace:
      <4>[174460.416617] <IRQ>
      <4>[174460.416784] [<ffffffff8147e3e0>] skb_push+0x40/0x50
      <4>[174460.416961] [<ffffffffa02cc57e>] ip6_finish_output2+0xae/0x390 [ipv6]
      <4>[174460.417131] [<ffffffffa02cd2d6>] ip6_fragment+0xa76/0xd30 [ipv6]
      <4>[174460.417302] [<ffffffffa02cc4d0>] ? ip6_finish_output2+0x0/0x390 [ipv6]
      <4>[174460.417474] [<ffffffffa02cac30>] ? ip6_forward_finish+0x0/0x10 [ipv6]
      <4>[174460.417645] [<ffffffffa02cd61c>] ip6_finish_output+0x8c/0xa0 [ipv6]
      <4>[174460.417813] [<ffffffffa02cd6a0>] ip6_output+0x70/0x110 [ipv6]
      <4>[174460.417982] [<ffffffffa02cea13>] ip6_forward+0x753/0x9b0 [ipv6]
      <4>[174460.418150] [<ffffffffa02cec70>] ? ip6_rcv_finish+0x0/0x40 [ipv6]
      <4>[174460.418318] [<ffffffffa02ceca7>] ip6_rcv_finish+0x37/0x40 [ipv6]
      <4>[174460.418485] [<ffffffffa03660fe>] ipv6_defrag+0xee/0x100 [nf_defrag_ipv6]
      <4>[174460.418653] [<ffffffff814c9754>] ? ip_local_deliver_finish+0x1b4/0x310
      <4>[174460.418820] [<ffffffff814be099>] nf_iterate+0x69/0xb0
      <4>[174460.418986] [<ffffffffa02cec70>] ? ip6_rcv_finish+0x0/0x40 [ipv6]
      <4>[174460.419151] [<ffffffff814be256>] nf_hook_slow+0x76/0x120
      <4>[174460.419316] [<ffffffffa02cec70>] ? ip6_rcv_finish+0x0/0x40 [ipv6]
      <4>[174460.419486] [<ffffffffa02cf035>] ipv6_rcv+0x385/0x470 [ipv6]
      <4>[174460.419652] [<ffffffff8148c328>] __netif_receive_skb+0x248/0x5f0
      <4>[174460.419821] [<ffffffff8148c76a>] process_backlog+0x9a/0x100
      <4>[174460.419990] [<ffffffff81491de0>] net_rx_action+0x110/0x310
      <4>[174460.420159] [<ffffffff8108c935>] __do_softirq+0x125/0x2a0
      <4>[174460.420331] [<ffffffff8100c4cc>] call_softirq+0x1c/0x30
      <4>[174460.420495] <EOI>
      <4>[174460.420656] [<ffffffff810103b5>] ? do_softirq+0x65/0xa0
      <4>[174460.420821] [<ffffffff81492278>] netif_rx_ni+0x28/0x30
      <4>[174460.420986] [<ffffffffa06363ca>] tun_get_user+0x24a/0x570 [tun]
      <4>[174460.421151] [<ffffffff8100bb0e>] ? common_interrupt+0xe/0x13
      <4>[174460.421318] [<ffffffff8147763b>] ? sys_recvfrom+0x16b/0x180
      <4>[174460.421484] [<ffffffffa0636816>] tun_chr_aio_write+0x86/0xe0 [tun]
      <4>[174460.421652] [<ffffffff811c0232>] do_sync_write+0xf2/0x140
      <4>[174460.421817] [<ffffffff811c0518>] vfs_write+0xb8/0x1a0
      <4>[174460.421980] [<ffffffff811c1f76>] ? fget_light_pos+0x16/0x50
      <4>[174460.422145] [<ffffffff811c0fa1>] sys_write+0x51/0xb0
      <4>[174460.422309] [<ffffffff8110677e>] ? __audit_syscall_exit+0x25e/0x290
      <4>[174460.422476] [<ffffffff8100b1a2>] system_call_fastpath+0x16/0x1b
      <4>[174460.422645] Code: 8b 57 68 48 89 44 24 10 8b 87 d4 00 00 00 48 89 44 24 08 8b bf d0 00 00 00 31 c0 48 89 3c 24 48 c7 c7 e0 fc 82 81 e8 ad 81 0d 00 <0f> 0b eb fe 66 66 66 66 66 66 2e 0f 1f 84 00 00 00 00 00 55 48
      <1>[174460.423334] RIP [<ffffffff8147d56d>] skb_under_panic+0x5d/0x70
      <4>[174460.423501] RSP <ffff8801b1a03a18>

        Attachments

          Issue Links

            Activity

              People

              Assignee:
              vvs Vasily Averin
              Reporter:
              ovz-jira-user.int OpenVZ JIRA
              Votes:
              0 Vote for this issue
              Watchers:
              3 Start watching this issue

                Dates

                Created:
                Updated:
                Resolved: